{"id":3364,"date":"2017-06-18T06:59:06","date_gmt":"2017-06-17T22:59:06","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=3364"},"modified":"2017-06-18T06:59:06","modified_gmt":"2017-06-17T22:59:06","slug":"java%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96%e6%bc%8f%e6%b4%9e","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/3364.html","title":{"rendered":"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e"},"content":{"rendered":"<p>=Start=<\/p>\n<h4 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u7f18\u7531\uff1a\">\u7f18\u7531\uff1a<\/h4>\n<p>\u5b66\u4e60\u3001\u63d0\u9ad8\u9700\u8981<\/p>\n<h4 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u6b63\u6587\uff1a\">\u6b63\u6587\uff1a<\/h4>\n<h5 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u53c2\u8003\u89e3\u7b54\uff1a\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n<h6 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u4ec0\u4e48\u662f\u5e8f\u5217\u5316\u3001\u53cd\u5e8f\u5217\u5316\uff1f\">\u4ec0\u4e48\u662f\u5e8f\u5217\u5316\u3001\u53cd\u5e8f\u5217\u5316\uff1f<\/h6>\n<p><span style=\"color: #0000ff;\">Java\u5e8f\u5217\u5316\u5c31\u662f\u628a\u5bf9\u8c61\u8f6c\u6362\u6210\u5b57\u8282\u6d41\uff0c\u4fbf\u4e8e\u4fdd\u5b58\u5728\u5185\u5b58\u3001\u6587\u4ef6\u3001\u6570\u636e\u5e93\u4e2d<\/span>\uff0cJava\u4e2d\u7684ObjectOutputStream\u7c7b\u7684writeObject()\u65b9\u6cd5\u53ef\u4ee5\u5b9e\u73b0\u5e8f\u5217\u5316\u3002<\/p>\n<p><span style=\"color: #ff0000;\">Java\u53cd\u5e8f\u5217\u5316\u5373\u9006\u8fc7\u7a0b\uff0c\u7531\u5b57\u8282\u6d41\u8fd8\u539f\u6210\u5bf9\u8c61<\/span>\u3002Java\u4e2dObjectInputStream\u7c7b\u7684readObject()\u65b9\u6cd5\u7528\u4e8e\u53cd\u5e8f\u5217\u5316\u3002<\/p>\n<h6 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u7684\u5371\u5bb3\">\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u7684\u5371\u5bb3<\/h6>\n<p>\u5f53\u5e94\u7528\u4ee3\u7801<span style=\"color: #ff0000;\"><strong>\u4ece\u7528\u6237\u63a5\u53d7\u5e8f\u5217\u5316\u6570\u636e<\/strong><\/span>\uff0c\u5e76\u8bd5\u56fe\u53cd\u5e8f\u5217\u5316\u6539\u6570\u636e\u8fdb\u884c\u4e0b\u4e00\u6b65\u5904\u7406\u65f6\uff0c\u4f1a\u4ea7\u751f\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\uff0c\u5176\u4e2d\u6700\u6709\u5371\u5bb3\u6027\u7684\u5c31\u662f\u8fdc\u7a0b\u4ee3\u7801\u6ce8\u5165\u3002<\/p>\n<p>\u8fd9\u79cd\u6f0f\u6d1e\u4ea7\u751f\u539f\u56e0\u662f\uff0cjava\u7c7bObjectInputStream\u5728\u6267\u884c\u53cd\u5e8f\u5217\u5316\u65f6\uff0c\u5e76\u4e0d\u4f1a\u5bf9\u81ea\u8eab\u7684\u8f93\u5165\u8fdb\u884c\u68c0\u67e5\uff0c\u8fd9\u5c31\u8bf4\u660e\u6076\u610f\u653b\u51fb\u8005\u53ef\u80fd\u4e5f\u53ef\u4ee5\u6784\u5efa\u7279\u5b9a\u7684\u8f93\u5165\uff0c\u5728 ObjectInputStream\u7c7b\u53cd\u5e8f\u5217\u5316\u4e4b\u540e\u4f1a\u4ea7\u751f\u975e\u6b63\u5e38\u7ed3\u679c\uff0c\u5229\u7528\u8fd9\u4e00\u65b9\u6cd5\u5c31\u53ef\u4ee5\u5b9e\u73b0\u8fdc\u7a0b\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002<\/p>\n<p>\u8fd9\u4e2a\u6f0f\u6d1e\u7684\u4e25\u91cd\u98ce\u9669\u5728\u4e8e\uff0c\u5373\u4f7f\u4f60\u7684\u4ee3\u7801\u91cc\u6ca1\u6709\u4f7f\u7528\u5230Apache Commons Collections\u91cc\u7684\u7c7b\uff0c\u53ea\u8981Java\u5e94\u7528\u7684Classpath\u91cc\u6709Apache Commons Collections\u7684jar\u5305\uff0c\u90fd\u53ef\u4ee5\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002<\/p>\n<p>\u6f0f\u6d1e\u7684\u6839\u6e90\u5176\u5b9e\u5e76\u4e0d\u662fJava\u5e8f\u5217\u5316\u7684\u95ee\u9898\uff0c\u800c\u662fApache Commons Collections\u5141\u8bb8\u94fe\u5f0f\u7684\u4efb\u610f\u7684\u7c7b\u51fd\u6570\u53cd\u5c04\u8c03\u7528\u3002\u653b\u51fb\u8005\u901a\u8fc7\u5141\u8bb8Java\u5e8f\u5217\u5316\u534f\u8bae\u7684\u7aef\u53e3\uff0c\u628a\u653b\u51fb\u4ee3\u7801\u4e0a\u4f20\u5230\u670d\u52a1\u5668\u4e0a\uff0c\u518d\u7531Apache Commons Collections\u91cc\u7684TransformedMap\u6765\u6267\u884c\u3002<\/p>\n<p>\u5982\u679cJava\u5e94\u7528\u5bf9\u7528\u6237\u8f93\u5165\uff0c\u5373\u4e0d\u53ef\u4fe1\u6570\u636e\u505a\u4e86\u53cd\u5e8f\u5217\u5316\u5904\u7406\uff0c\u90a3\u4e48\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u6784\u9020\u6076\u610f\u8f93\u5165\uff0c\u8ba9\u53cd\u5e8f\u5217\u5316\u4ea7\u751f\u975e\u9884\u671f\u7684\u5bf9\u8c61\uff0c\u975e\u9884\u671f\u7684\u5bf9\u8c61\u5728\u4ea7\u751f\u8fc7\u7a0b\u4e2d\u5c31\u6709\u53ef\u80fd\u5e26\u6765\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002\u5047\u82e5\u53cd\u5e8f\u5217\u5316\u53ef\u4ee5\u8bbe\u7f6eJava\u7c7b\u578b\u7684\u767d\u540d\u5355\uff0c\u90a3\u4e48\u95ee\u9898\u7684\u5f71\u54cd\u5c31\u5c0f\u4e86\u5f88\u591a\u3002<\/p>\n<h6 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u7684\u8865\u6551\u63aa\u65bd\/\u4fee\u590d\u5efa\u8bae\">\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u7684\u8865\u6551\u63aa\u65bd\/\u4fee\u590d\u5efa\u8bae<\/h6>\n<p><strong>\u4e34\u65f6\u65b9\u6848\uff1a<\/strong><\/p>\n<p>\u4e00\u4e2a\u4e34\u65f6\u7684\u89e3\u51b3\u65b9\u6848\u53ef\u4ee5\u53c2\u8003NibbleSecurity\u516c\u53f8\u7684ikkisoft\u5728github\u4e0a\u653e\u51fa\u4e86\u4e00\u4e2a\u4e34\u65f6\u8865\u4e01<a class=\"external-link\" href=\"https:\/\/github.com\/ikkisoft\/SerialKiller\" rel=\"nofollow\">SerialKiller<\/a>\u3002<\/p>\n<p>\u4e0b\u8f7d\u8fd9\u4e2ajar\u540e\u653e\u7f6e\u4e8eclasspath\uff0c\u5c06\u5e94\u7528\u4ee3\u7801\u4e2d\u7684java.io.ObjectInputStream\u66ff\u6362\u4e3aSerialKiller\uff0c\u4e4b\u540e\u914d\u7f6e\u8ba9\u5176\u80fd\u591f\u5141\u8bb8\u6216\u7981\u7528\u4e00\u4e9b\u5b58\u5728\u95ee\u9898\u7684\u7c7b\uff0cSerialKiller\u6709Hot-Reload,Whitelisting,Blacklisting\u51e0\u4e2a\u7279\u6027\uff0c\u63a7\u5236\u4e86\u5916\u90e8\u8f93\u5165\u53cd\u5e8f\u5217\u5316\u540e\u7684\u53ef\u4fe1\u7c7b\u578b\u3002<\/p>\n<p><strong>\u4fee\u590d\u65b9\u6848\uff1a<\/strong><\/p>\n<p>Apache Commons Collections\u5728 3.2.2\u7248\u672c\u4e2d\u505a\u4e86\u4e00\u5b9a\u7684\u5b89\u5168\u5904\u7406\uff0c\u5bf9\u8fd9\u4e9b\u4e0d\u5b89\u5168\u7684Java\u7c7b\u7684\u5e8f\u5217\u5316\u652f\u6301\u589e\u52a0\u4e86\u5f00\u5173\uff0c\u9ed8\u8ba4\u4e3a\u5173\u95ed\u72b6\u6001\u3002\u6d89\u53ca\u7684\u7c7b\u5305\u62ec\uff1aCloneTransformer,ForClosure, InstantiateFactory, InstantiateTransformer, InvokerTransformer, PrototypeCloneFactory,PrototypeSerializationFactory, WhileClosure\u3002<\/p>\n<p><strong>\u72e0\u4e00\u70b9\u7684\u65b9\u6848\uff1a<\/strong><\/p>\n<p>\u7981\u6b62JVM\u6267\u884c\u5916\u90e8\u547d\u4ee4\uff08\u672a\u77e5\u6f0f\u6d1e\u7684\u5371\u5bb3\u6027\u4f1a\u5927\u5927\u964d\u4f4e\uff0c\u53ef\u4ee5\u5927\u5927\u63d0\u9ad8JVM\u7684\u5b89\u5168\u6027\uff09<\/p>\n<p><strong>\u5176\u5b83\uff1a<\/strong><\/p>\n<p>RedHat\u53d1\u5e03JBoss\u76f8\u5173\u4ea7\u54c1\u7684\u89e3\u51b3\u65b9\u6848\uff1a<a class=\"external-link\" href=\"https:\/\/access.redhat.com\/solutions\/2045023%E3%80%82\" rel=\"nofollow\">https:\/\/access.redhat.com\/solutions\/2045023<\/a><\/p>\n<h5 id=\"Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e-\u53c2\u8003\u94fe\u63a5\uff1a\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n<p><span style=\"color: #ff0000;\"><strong>Lib\u4e4b\u8fc7\uff1fJava\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u901a\u7528\u5229\u7528\u5206\u6790<\/strong><\/span><br \/>\n<a class=\"external-link\" href=\"https:\/\/blog.chaitin.cn\/2015-11-11_java_unserialize_rce\/\" rel=\"nofollow\">https:\/\/blog.chaitin.cn\/2015-11-11_java_unserialize_rce\/<\/a><\/p>\n<p>What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability.<br \/>\n<a href=\"https:\/\/foxglovesecurity.com\/2015\/11\/06\/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability\/\">https:\/\/foxglovesecurity.com\/2015\/11\/06\/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability\/<\/a><\/p>\n<p>Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u88ab\u5ffd\u7565\u7684\u5927\u89c4\u6a21\u6740\u4f24\u5229\u7528<br \/>\n<a class=\"external-link\" href=\"http:\/\/www.infoq.com\/cn\/articles\/java-deserialization-nsfocus\" rel=\"nofollow\">http:\/\/www.infoq.com\/cn\/articles\/java-deserialization-nsfocus<\/a><\/p>\n<p>Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u8be6\u89e3<br \/>\n<a class=\"external-link\" href=\"https:\/\/www.secpulse.com\/archives\/42126.html\" rel=\"nofollow\">https:\/\/www.secpulse.com\/archives\/42126.html<\/a><\/p>\n<p>JAVA\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u5b8c\u6574\u8fc7\u7a0b\u5206\u6790\u4e0e\u8c03\u8bd5<br \/>\n<a class=\"external-link\" href=\"http:\/\/wps2015.org\/drops\/drops\/JAVA%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%E5%AE%8C%E6%95%B4%E8%BF%87%E7%A8%8B%E5%88%86%E6%9E%90%E4%B8%8E%E8%B0%83%E8%AF%95.html\" rel=\"nofollow\">http:\/\/wps2015.org\/drops\/drops\/JAVA%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%E5%AE%8C%E6%95%B4%E8%BF%87%E7%A8%8B%E5%88%86%E6%9E%90%E4%B8%8E%E8%B0%83%E8%AF%95.html<\/a><\/p>\n<p>\u6df1\u5165\u7406\u89e3 JAVA \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e<br \/>\n<a class=\"external-link\" href=\"http:\/\/paper.seebug.org\/312\/\" rel=\"nofollow\">http:\/\/paper.seebug.org\/312\/<\/a><\/p>\n<p>Commons Collections Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u6df1\u5165\u5206\u6790<br \/>\n<a class=\"external-link\" href=\"https:\/\/security.tencent.com\/index.php\/blog\/msg\/97\" rel=\"nofollow\">https:\/\/security.tencent.com\/index.php\/blog\/msg\/97<\/a><\/p>\n<p>JAVA\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u77e5\u8bc6\u70b9\u6574\u7406<br \/>\n<a class=\"external-link\" href=\"https:\/\/3wapp.github.io\/2017\/05\/07\/JAVA%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%E7%9F%A5%E8%AF%86%E7%82%B9%E6%95%B4%E7%90%86\/\" rel=\"nofollow\">https:\/\/3wapp.github.io\/2017\/05\/07\/JAVA%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%E7%9F%A5%E8%AF%86%E7%82%B9%E6%95%B4%E7%90%86\/<\/a><\/p>\n<p>Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\uff08\u9644POC\uff09<br \/>\n<a class=\"external-link\" href=\"http:\/\/www.freebuf.com\/vuls\/86566.html\" rel=\"nofollow\">http:\/\/www.freebuf.com\/vuls\/86566.html<\/a><\/p>\n<p><span style=\"color: #0000ff;\"><strong>\u5b66\u4e60\u624b\u518c\uff1aJAVA\u5e8f\u5217\u5316\u548c\u53cd\u5e8f\u5217\u5316\u53ca\u6f0f\u6d1e\u8865\u6551<\/strong><\/span><br \/>\n<a class=\"external-link\" href=\"http:\/\/blog.nsfocus.net\/learning-guide-java-serialization-de-serialization-vulnerability-remediation\/\" rel=\"nofollow\">http:\/\/blog.nsfocus.net\/learning-guide-java-serialization-de-serialization-vulnerability-remediation\/<\/a><\/p>\n<p><strong><span style=\"color: #0000ff;\">Java\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\u88ab\u5ffd\u7565\u7684\u5927\u89c4\u6a21\u6740\u4f24\u5229\u7528<\/span><\/strong><br \/>\n<a class=\"external-link\" href=\"http:\/\/blog.nsfocus.net\/java-deserialization-vulnerability-overlooked-mass-destruction\/\" rel=\"nofollow\">http:\/\/blog.nsfocus.net\/java-deserialization-vulnerability-overlooked-mass-destruction\/<\/a><\/p>\n<p>Matthias Kaiser &#8211; Exploiting Deserialization Vulnerabilities in Java.<br \/>\n<a href=\"http:\/\/www.slideshare.net\/codewhitesec\/exploiting-deserialization-vulnerabilities-in-java-54707478\">http:\/\/www.slideshare.net\/codewhitesec\/exploiting-deserialization-vulnerabilities-in-java-54707478<\/a><\/p>\n<p>SerialKiller<br \/>\n<a href=\"https:\/\/github.com\/ikkisoft\/SerialKiller\">https:\/\/github.com\/ikkisoft\/SerialKiller<\/a><\/p>\n<p>ysoserial<br \/>\n<a href=\"https:\/\/github.com\/frohoff\/ysoserial\">https:\/\/github.com\/frohoff\/ysoserial<\/a><\/p>\n<p>JavaUnserializeExploits<br \/>\n<a href=\"https:\/\/github.com\/foxglovesec\/JavaUnserializeExploits\">https:\/\/github.com\/foxglovesec\/JavaUnserializeExploits<\/a><\/p>\n<p>JBoss-exp<br \/>\n<a class=\"external-link\" href=\"https:\/\/github.com\/Xyntax\/JBoss-exp\" rel=\"nofollow\">https:\/\/github.com\/Xyntax\/JBoss-exp<\/a><\/p>\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u5b66\u4e60\u3001\u63d0\u9ad8\u9700\u8981 \u6b63\u6587\uff1a \u53c2\u8003\u89e3\u7b54\uff1a \u4ec0\u4e48\u662f\u5e8f\u5217\u5316\u3001\u53cd\u5e8f\u5217\u5316\uff1f Java\u5e8f\u5217\u5316\u5c31\u662f\u628a\u5bf9\u8c61 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25,12],"tags":[435,61,825,586,826,827,824],"class_list":["post-3364","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","category-tools","tag-apache","tag-java","tag-jboss","tag-jenkins","tag-weblogic","tag-websphere","tag-824"],"views":12286,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/3364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=3364"}],"version-history":[{"count":2,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/3364\/revisions"}],"predecessor-version":[{"id":3367,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/3364\/revisions\/3367"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=3364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=3364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=3364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}